Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10784

Опубликовано: 04 фев. 2020
Источник: debian
EPSS Низкий

Описание

phppgadmin through 7.12.1 allows sensitive actions to be performed without validating that the request originated from the application. One such area, "database.php" does not verify the source of an HTTP request. This can be leveraged by a remote attacker to trick a logged-in administrator to visit a malicious page with a CSRF exploit and execute arbitrary system commands on the server.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
phppgadminfixed7.14.7+dfsg-1package
phppgadminno-dsabusterpackage
phppgadminno-dsastretchpackage
phppgadminno-dsajessiepackage

Примечания

  • https://snyk.io/vuln/SNYK-PHP-PHPPGADMINPHPPGADMIN-543885

  • https://github.com/phppgadmin/phppgadmin/issues/94

EPSS

Процентиль: 62%
0.00431
Низкий

Связанные уязвимости

CVSS3: 9.6
ubuntu
около 6 лет назад

phppgadmin through 7.12.1 allows sensitive actions to be performed without validating that the request originated from the application. One such area, "database.php" does not verify the source of an HTTP request. This can be leveraged by a remote attacker to trick a logged-in administrator to visit a malicious page with a CSRF exploit and execute arbitrary system commands on the server.

CVSS3: 9.6
nvd
около 6 лет назад

phppgadmin through 7.12.1 allows sensitive actions to be performed without validating that the request originated from the application. One such area, "database.php" does not verify the source of an HTTP request. This can be leveraged by a remote attacker to trick a logged-in administrator to visit a malicious page with a CSRF exploit and execute arbitrary system commands on the server.

suse-cvrf
больше 3 лет назад

Security update for phpPgAdmin

github
больше 3 лет назад

phppgadmin through 7.12.1 allows sensitive actions to be performed without validating that the request originated from the application. One such area, "database.php" does not verify the source of an HTTP request. This can be leveraged by a remote attacker to trick a logged-in administrator to visit a malicious page with a CSRF exploit and execute arbitrary system commands on the server.

EPSS

Процентиль: 62%
0.00431
Низкий